BSA-2017-449
21457
24 December 2018
17 November 2017
Closed
Low
9.8
N/A
CVE-2017-14491
Summary
Security Advisory ID : BSA-2017-449
Component : dnsmasq
Revision : 2.0: Final
A heap buffer overflow was found in dnsmasq in the code responsible for building DNS replies. An attacker could send crafted DNS packets to dnsmasq which would cause it to crash or, potentially, execute arbitrary code.
Affected Products
No Brocade Fibre Channel technology products from Broadcom are currently known to be affected by this vulnerability.
Workaround
There are no workarounds that address this vulnerability.
Note
Brocade Manageability products are not vulnerable. However, since the environement that runs the products is not under Brocade's control, Brocade recommends Customers to apply recommendation from the vendors.
Revision History
Version | Change | Date |
---|---|---|
1.0 | Initial Publication | November 17, 2017 |
2.0 | Update for Fibre Channel Only | December 24, 2018 |